Cybersecurity

THE GREAT “anti-Semitic” fantasy, we are told, is that Jews, operating from some secret base somewhere, are involved in almost every form of nefariousness across the world. A recent article in the Israeli newspaper Haaretz shows that this fantasy is, to significant degree, true.
It…

Massive ban by Jewish-dominated regime is supposedly to counter “Russian influence”
UKRAINE is blacklisting the country’s most popular social network VKontakte, email provider Mail.Ru and a host of other companies — all because they’re Russian businesses.…

A better way for Big Brother to look over your shoulder
REMEMBER that racy film you probably should not have enjoyed on Netflix last weekend? Eran Tromer’s algorithms can tell what it was. Although videos streamed from services such as Netflix, Amazon and YouTube are encrypted in various ways to ensure…

Despite retraction of the report by a DNC-employed cybersecurity company that was behind the much-trumpeted claims of Russian hacking, allegedly intended to undermine America’s democratic processes and put Donald Trump in the White House, claims of Russian meddling continue to be made by …

An in-depth documentary revealing the history of Stuxnet being just a very small part of an apocalyptic cyber warfare arsenal known as Nitro Zeus.
IN THE MOST in-depth documentary to date on the Stuxnet industrial infrastructure worm, which has spread across the world and destroyed 1,000 nuclear…

For the past seven years, Huawei Technologies has been developing a range of software and equipment, some potentially sensitive, through an Israel-registered company called Toga Networks, according to former and current employees of both companies.
Note by John I. Johnson: I have a very good idea…

The purpose of the Constitutional protections created by our White forefathers was not to make things easier for the police.
SECURITY RESEARCHERS and civil liberties advocates on Friday condemned draft legislation leaked from the U.S. Senate that would let judges order technology companies to…

NOTE by John I. Johnson: How much of Jewish political, financial, and social success — and easy outmaneuvering of those they hate — is due to inside knowledge, invasion of privacy, and theft of information which they subsequently act upon? My guess: a lot. Such behavior has always been…

EDITOR’S NOTE: This isn’t about “protecting us from terrorism.” Any terrorist with an IQ above room temperature can use one-time pads for communications — and they can never be decrypted, not even by next century’s supercomputers. What this demand is all…

by John I. Johnson
IT MIGHT be prudent to view the world, conceptually, in terms of “pre-May 2014” (when the Utah Data Center was completed — that’s how recent it is) and “post-May 2014.” Evidently the facility pools data from all intelligence agencies, not…